Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Netgate 2100 - setup question

    Scheduled Pinned Locked Moved Official Netgate® Hardware
    67 Posts 6 Posters 11.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • N
      netboy @rcoleman-netgate
      last edited by netboy

      @rcoleman-netgate on the LAN firewall (192) BLOCK IoT (172) and this must be the FIRST rule. Have I got it right? On drop down there are two options IOTP4 address and IOTP4 net - which one to select as source

      Below correct?

      e08ec21a-9b3c-4b6b-9064-92bb20e99fa8-image.png

      R 1 Reply Last reply Reply Quote 0
      • R
        rcoleman-netgate Netgate @netboy
        last edited by rcoleman-netgate

        @netboy That will only block HTTP and HTTPS but not Ping or DNS

        Set the traffic to ANY type, not TCP.

        And, as I said, IOT Network, not IOT Address :)

        Ryan
        Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
        Requesting firmware for your Netgate device? https://go.netgate.com
        Switching: Mikrotik, Netgear, Extreme
        Wireless: Aruba, Ubiquiti

        N 1 Reply Last reply Reply Quote 0
        • N
          netboy @rcoleman-netgate
          last edited by

          @rcoleman-netgate
          Is this correct? The order ok?

          c6bd482f-02a0-4a64-91b2-03c056b85625-image.png

          R 1 Reply Last reply Reply Quote 0
          • R
            rcoleman-netgate Netgate @netboy
            last edited by

            @netboy Needs to be IOTP4 Network, not address.

            Ryan
            Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
            Requesting firmware for your Netgate device? https://go.netgate.com
            Switching: Mikrotik, Netgear, Extreme
            Wireless: Aruba, Ubiquiti

            N 1 Reply Last reply Reply Quote 0
            • N
              netboy @rcoleman-netgate
              last edited by

              @rcoleman-netgate got it

              This ok?

              4248567e-80f3-4adf-9eb5-bcebff1605f6-image.png

              R 1 Reply Last reply Reply Quote 0
              • R
                rcoleman-netgate Netgate @netboy
                last edited by

                @netboy Should be. Plug into the IOTP4 network and try to access anything on the LAN network (pf GUI on that IP, ping, etc.)

                it should block, and when you come back the

                0 / 0 B
                

                in the states column should increment.

                Ryan
                Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                Requesting firmware for your Netgate device? https://go.netgate.com
                Switching: Mikrotik, Netgear, Extreme
                Wireless: Aruba, Ubiquiti

                N 1 Reply Last reply Reply Quote 0
                • N
                  netboy @rcoleman-netgate
                  last edited by

                  @rcoleman-netgate Did not work - please see screen shot below

                  6b5f8147-a569-415d-a74f-ecf1b8e33691-image.png

                  R 1 Reply Last reply Reply Quote 0
                  • R
                    rcoleman-netgate Netgate @netboy
                    last edited by

                    @netboy ede0256f-99fd-48dd-9d2d-9bf343ff18d0-image.png

                    Automatically Select == use the network based on the IP you're pinging. Switch that to "IOTP4"

                    Ryan
                    Repeat, after me: MESH IS THE DEVIL! MESH IS THE DEVIL!
                    Requesting firmware for your Netgate device? https://go.netgate.com
                    Switching: Mikrotik, Netgear, Extreme
                    Wireless: Aruba, Ubiquiti

                    N 1 Reply Last reply Reply Quote 0
                    • N
                      netboy @rcoleman-netgate
                      last edited by

                      @rcoleman-netgate 96c4538b-0abf-49b6-b411-42736c54471c-image.png

                      Able to ping after pointing source address to IOTP4

                      N 2 Replies Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        You should move that rule from the LAN interface to the IOTP4 interface.

                        Connections are opened from there and that's where they need to be blocked.

                        You probably also want the destination to be LANnet so that all hosts in the LAN subnet are blocked.
                        I would also choose to use a reject rule rather than block there so that clients on the IOTP4 subnet see the connection as refused imediately rather than having to timeout. It just makes failures easier to handle for devices mistakenly trying to access LAN.

                        You need to test it from a device on the IOTP4 subnet so that the traffic goes through the IOTP4 firewall rules.

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • N
                          netboy @netboy
                          last edited by

                          This post is deleted!
                          1 Reply Last reply Reply Quote 0
                          • N
                            netboy @netboy
                            last edited by

                            @netboy OK

                            Removed BLOCK rule from LAN interface and included this

                            03bbbffe-c685-4481-bf5f-fd62b4196f45-image.png

                            Shall I apply this and test?

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              That will work. I would set the protocol to 'any' though to include ping etc.

                              N 1 Reply Last reply Reply Quote 0
                              • N
                                netboy @stephenw10
                                last edited by

                                @stephenw10
                                This is what my firewall rules are now

                                ffab19ef-907c-4408-baf5-341cb8399198-image.png

                                Did a ping test and works - does not block!

                                dc6486c4-a245-4073-b6ed-de112a365a8b-image.png

                                1 Reply Last reply Reply Quote 0
                                • stephenw10S
                                  stephenw10 Netgate Administrator
                                  last edited by

                                  Yeah, you have to test from a device in the IOP4 subnet. Pings generated from pfSense itself do not get filtered by those firewall rules. Only outbound rules would be applied and by default everything is allowed outbound.

                                  Steve

                                  N 1 Reply Last reply Reply Quote 0
                                  • N
                                    netboy @stephenw10
                                    last edited by

                                    @stephenw10

                                    Looks like a SUCCESS!

                                    36935045-399a-4d94-85c5-e5a463109977-image.png

                                    Thank yo Stephenw10 and all others

                                    N 1 Reply Last reply Reply Quote 1
                                    • N
                                      netboy @netboy
                                      last edited by

                                      @netboy Able to ping from 192 subnet to 172

                                      a864c39d-fc04-4a67-9714-a93057a04abe-image.png

                                      I think I have to thank everybody in this forum. Netgate 2100 Max is a fantastic router though pricey.

                                      I shall seek further help if need be.

                                      Thank you everybody

                                      N 1 Reply Last reply Reply Quote 1
                                      • N
                                        netboy @netboy
                                        last edited by

                                        @netboy I am documenting below "how I made my printers work over the network in windows 10"

                                        My printers are in 172.16.0.XXX subnet and my computers are in 192.168.0.XXX subnet. 192.168.0.XXX can talk to (ALLOW) 172.16.0.XXX but not vice versa.

                                        The first thing I did was connected my computer to 172 subnet and configure the printers.

                                        I then connected my computers to 192 subnet and used the windows tool to configure TCP/IP printers and gave the "static" IP address of the printers and it worked.

                                        N 1 Reply Last reply Reply Quote 1
                                        • N
                                          netboy @netboy
                                          last edited by netboy

                                          @netboy I am back! I have one problem. Let me explain.

                                          My NAS has 2 NIC's one on 192.168.0.XXX (PvT) subnet & another172.16.0.XXX (IoT) subnet.

                                          Now I want to:

                                          • Create a GROUP with a List of MAC address that are in my 172.16.0.XXX (IoT) subnet hat can access my NAS (which is also in 172.16.0.XXX (IoT) ) [ MACgroupAllow ]

                                          • Firewall rule : ALLOW MACgroupAllow access to my NAS MAC XX.XX.XX.XX and

                                          • BLOCK all traffic within my subnet 172.16.0.XXX (IoT) in accessing my NAS MAC XX.XX.XX.XX

                                          This is my existing firewall rules in IoT subnet

                                          9c512398-caec-460d-ad89-c2dc1b2831f9-image.png

                                          Does it make sense? I am not sure I have explained my functionality well .

                                          1 Reply Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            That would need to be done on the NAS dircetly. Traffic between clients on the IoT subnet and the NAS IP address also in the IoT subnet does not go through pfSense, it just goes directly. So pfSense cannot filter it.

                                            With that said pfSense is a layer 3 firewall so filtering MAC addresses (layer 2) is not something it's is setup to do. You can do something like that by setting fixed dhcp leases for each MAC and then filtering by those IPs. But only for traffic passing the firewall.

                                            Steve

                                            N 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.